Publication number | US8036383 B2 |
Publication type | Grant |
Application number | US 12/103,130 |
Publication date | Oct 11, 2011 |
Filing date | Apr 15, 2008 |
Priority date | Nov 22, 2007 |
Fee status | Paid |
Also published as | US20090138743 |
Publication number | 103130, 12103130, US 8036383 B2, US 8036383B2, US-B2-8036383, US8036383 B2, US8036383B2 |
Inventors | Jae Heon Kim, Jae Woo Han, Dong Chan Kim, Sang Woo Park |
Original Assignee | Electronics And Telecommunications Research Institute |
Export Citation | BiBTeX, EndNote, RefMan |
Patent Citations (15), Classifications (7), Legal Events (2) | |
External Links: USPTO, USPTO Assignment, Espacenet | |
This application claims priority to and the benefit of Korean Patent Application No. 2007-119681, filed Nov. 22, 2007, the disclosure of which is incorporated herein by reference in its entirety.
1. Field of the Invention
The present invention relates to a method and apparatus for secure communication between cryptographic systems using a Real Time Clock (RTC), and more particularly, to a method and apparatus for secure communication between cryptographic systems allowing a transmitting cryptographic system to transfer partial RTC data and a receiving cryptographic system to restore entire RTC data and thereby minimizing data to be transferred between the cryptographic systems.
2. Discussion of Related Art
As network communication has become a major means for exchanging information, the necessity of securing important information, e.g., private information and a secret code, exchanged in a network has increased. However, networks are vulnerable to cyber attacks, and thus it is necessary to safely transfer important information exchanged in a network using a cryptosystem shared by both sides of communication.
There are typical cryptosystems such as a secret-key cryptosystem and a public-key cryptosystem.
According to the public-key cryptosystem, a key used for encrypting data is different from a key used for decrypting the data. In general, the key used for encryption is referred to as a public key, and the key used for decrypting a ciphertext encrypted using the public key is referred to as a private key. The private key is secured so that a user alone knows it, but the public key is published so that anyone can obtain it. A ciphertext encrypted using a public key can be decrypted using only a private key that makes a pair with the public key.
On the other hand, according to the secret-key cryptosystem, two users performing cryptographic communication share a secret key and perform encryption and decryption using the secret key. Therefore, the same key is used for encrypting and decrypting data.
In the secret-key cryptosystem, a master key is a secret key shared by two users performing secure communication. Here, when encryption and decryption is performed using only one master key, the same ciphertexts are generated from one plaintext. When the same ciphertext are generated, an outsider can find out the secret key. To prevent this, data of a number or bit string used only once, referred to as a “nonce”, is used whenever cryptographic communication is performed. Every time cryptographic communication is performed, a new encryption key or decryption key is generated using a master key and a nonce. Here, the generated key is referred to as a session key.
Two users performing secure communication insert a master key and a nonce into a Key Derivation Function (KDF) and use the output value as a session key. By constantly generating and using a new session key, it is possible to generate various ciphertexts from one plaintext.
Referring to
To share the same session key, two cryptographic systems need to share the same nonce. To this end, in general, one cryptographic system generates a nonce and transfers it to the other cryptographic system. Here, it is necessary to minimize the size of the transferred nonce in a poor communication environment. However, when the size of a nonce is reduced, a probability of the nonce being reused increases, and the same session key as the previously used session key may be generated. Therefore, a nonce must not be reused.
To prevent a nonce from being reused, a continuously changed value, such as a counter, is used as a nonce. Here, an RTC is frequently used as a counter because it can serve as a common value that can be shared by all systems. However, due to RTC deviation among systems, it is very difficult for all the systems to share the same RTC data.
The present invention is directed to a method and apparatus allowing a transmitting cryptographic system to generate a nonce value N=f(T_{A}, other data) (f is a function) using entire Real Time Counter (RTC) data T_{A }and transfer N^{T}=(P_{A}∥ other data) obtained using partial RTC data P_{A }to a receiving cryptographic system and the receiving cryptographic system to restore the entire RTC data T_{A }and the correct nonce value N from the received partial RTC data P_{A}, and thereby minimizing data to be transferred between the cryptographic systems.
One aspect of the present invention provides a method for secure communication between cryptographic systems using an RTC, the method comprising: calculating a largest RTC deviation between a transmitting cryptographic system and a receiving cryptographic system; calculating the smallest number of bits of partial data on an RTC required for restoring entire data on the RTC on the basis of the calculated largest RTC deviation; calculating the partial RTC data on the basis of the calculated smallest number of bits of the partial RTC data; and transferring the calculated partial RTC data to the receiving cryptographic system.
The method may further comprise restoring, at the receiving cryptographic system, the entire RTC data on the basis of the received partial RTC data.
The largest RTC deviation may be calculated according to lives of the transmitting and receiving cryptographic systems and an accuracy of the RTC.
The smallest number “n” of bits of the partial RTC data may be calculated by the following equation: n=┌log_{2 }T_{d}┐1 denotes a largest RTC deviation between a transmitting cryptographic system and a receiving cryptographic system).
The partial RTC data may be calculated by the following equation: T_{A }mod 2^{n }(T_{A }denotes an RTC value of a transmitting cryptographic system, and n denotes the smallest number of bits of partial RTC data).
The entire RTC data X may render |X−T_{B}| (T_{B }denotes an RTC value of a receiving cryptographic system) to be a smallest value and may be calculated by the following equation: X=T_{A }mod 2^{n}+k 2^{n }(k is an integer).
Another aspect of the present invention provides an apparatus for secure communication between cryptographic systems using an RTC, the apparatus comprising: a largest RTC deviation calculator for calculating a largest RTC deviation between a transmitting cryptographic system and a receiving cryptographic system; a partial RTC data calculator for calculating the smallest number of bits of partial data on an RTC required for restoring entire data on the RTC on the basis of the calculated largest RTC deviation; a partial RTC data extractor for calculating the partial RTC data on the basis of the calculated smallest number of bits of the partial RTC data; and a partial RTC data transmitter for transferring the calculated partial RTC data to the receiving cryptographic system.
The apparatus may further comprise: a partial RTC data receiver for receiving transferred partial RTC data; and an entire RTC data restorer for restoring entire RTC data on the basis of the received partial RTC data.
The largest RTC deviation calculator may calculate the largest RTC deviation according to lives of the transmitting and receiving cryptographic systems and an accuracy of the RTC.
The partial RTC data calculator may calculate the smallest number “n” of bits of the partial RTC data using the following equation: N=┌log_{2 }T_{d}┐+1 (T_{d }denotes a largest RTC deviation between a transmitting cryptographic system and a receiving cryptographic system).
The partial RTC data extractor may calculate the partial RTC data using the following equation: T_{A }mod 2^{n }(T_{A }denotes an RTC value of a transmitting cryptographic system, and n denotes the smallest number of bits of partial RTC data).
The entire RTC data restorer may calculate the entire RTC data X rendering |X−T_{B}| (T_{B }denotes an RTC value of a receiving cryptographic system) to be a smallest value using the following equation: X=T_{A }mod 2^{n}+k 2^{n }(k is an integer).
The above and other objects, features and advantages of the present invention will become more apparent to those of ordinary skill in the art by describing in detail exemplary embodiments thereof with reference to the attached drawings, in which:
Hereinafter, exemplary embodiments of the present invention will be described in detail. However, the present invention is not limited to the embodiments disclosed below, but can be implemented in various forms. The following embodiments are described in order to enable those of ordinary skill in the art to embody and practice the present invention.
Referring to
Since cryptographic system A 200 includes the RTC transmitter 250 and the RTC receiver 280 and cryptographic system B 205 includes the RTC transmitter 255 and the RTC receiver 285, cryptographic system A 200 and cryptographic system B 205 can transfer and receive an RTC.
A case will be described below in which cryptographic system A 200 transfers a ciphertext to cryptographic system B 205.
First, the largest RTC deviation calculator 210 calculates a largest RTC deviation T_{d }(in seconds) between cryptographic system A 200 and cryptographic system B 205. Assuming that an RTC deviation, which is a difference between a current time and an RTC value, is “a”, an RTC value of cryptographic system A 200 may be (current time−a), and an RTC value of cryptographic system B 205 may be (current time+a). Thus, the largest RTC deviation may be 2 a. Here, lives of cryptographic system A 200 and cryptographic system B 205 and an accuracy of the RTC (i.e., a frequency of a crystal oscillator) should be obtained to determine the RTC deviation “a”.
For example, there is a cryptographic system that has a life of thirty years, and an accuracy of an RTC used in the system is 1 ppm, i.e., a deviation of one second occurs during 1000000 seconds. Since one year is about 2^{25 }seconds and 1000000 seconds are about 2^{20 }seconds, a deviation occurring during one year is about 2^{5 }(=2^{25}/2^{20}) seconds. The cryptographic system operates for thirty years, i.e., about 2^{5 }years, and thus a largest RTC deviation is 2^{10 }(=2^{5}*2^{5})
Then, the partial RTC data calculator 220 calculates the number of bits of partial RTC data to be transferred. Here, the number “n” of bits to be transferred is as shown in Equation 1 below.
n=┌log_{2 } T _{d}┐+1 Equation 1
(T_{d }denotes the largest RTC deviation between cryptographic systems)
And then, the partial RTC data extractor 230 calculates T_{A }mod 2^{n }that is a remainder obtained by dividing T_{A}, which is an RTC value of cryptographic system A 200, by 2^{n}.
This is application of an integer grouping method of dividing all integers into k groups. The integer grouping method is as follows:
Through the calculation, the partial RTC data extractor 230 finds out a representative of a group to which the entire RTC data T_{A }belongs, and determines the representative as partial RTC data P_{A}. Cryptographic system A 200 generates a session key using the entire RTC data T_{A }as a nonce and then generates a ciphertext.
After this, when cryptographic system A 200 transfers the ciphertext to cryptographic system B 205, the partial RTC data transmitter 240 transfers the calculated value T_{A }mod 2^{n}, i.e., the representative value of the group to which the RTC value of cryptographic system A 200 belongs, to the partial RTC data receiver 265 of cryptographic system B 205.
The entire RTC data restorer 275 of cryptographic system B 205 finds out the RTC value of cryptographic system A 200 using the representative value of the group, to which the RTC value of cryptographic system A 200 belongs, received by the partial RTC data receiver 265. More specifically, the entire RTC data restorer 275 calculates candidate values that can be the RTC value of cryptographic system A 200 using the RTC representative value, and determines as the RTC value a value having a smallest difference from an RTC value of cryptographic system B 205 among the candidate values.
To this end, X minimizing is first calculated. Here, T_{B }is the RTC value of cryptographic system B 205, and X is as shown in Equation 2 below.
X=T _{A }mod 2^{n} +k2^{n} Equation 2
(k is an integer)
Through the process above, Equation 3 below is satisfied, and remainders obtained by dividing X and T_{A }by 2^{n }are the same as each other. Consequently, X is equal to T_{A}.
|X−T _{A} |≦|X−T _{B} |+|T _{B} −T _{A}|≦2^{n−1} +T _{d}<2^{n} Equation 3
When the entire RTC data of cryptographic system A 200 is restored through the above described process, cryptographic system B 205 generates a session key of a receiving side using the entire RTC data and decrypts the ciphertext.
The above process will be described with reference to an example.
Assuming that a largest RTC deviation between cryptographic systems A and B is 30 seconds, an RTC value of cryptographic system A is 10 hours 59 minutes 45 seconds (39585 seconds), and an RTC value of cryptographic system B is 11 hours 00 minutes 03 seconds (39603 seconds), n is equal to 6, and cryptographic system A transfers “33” that is a remainder obtained by dividing 39585 by 64 (2^{6}) to cryptographic system B. Cryptographic system B calculates X satisfying X=T_{A }mode 64=33 and minimizing |X−39603|, thereby obtaining X of 39585. Consequently, when cryptographic system A transfers partial data of its RTC value corresponding to 6 bits to cryptographic system B, cryptographic system B can restore the entire RTC value of cryptographic system A using its RTC value.
First, cryptographic system A transferring a ciphertext calculates a largest RTC deviation between cryptographic system A itself and cryptographic system B receiving the ciphertext in consideration of lives of the two cryptographic systems and an accuracy of an RTC, i.e., a frequency of a crystal oscillator (step 310).
Subsequently, cryptographic system A calculates the number “n” of bits of partial RTC data to be transferred using Equation 1 above (step 320).
In the next step, cryptographic system A calculates T_{A }mod 2^{n }that is a remainder obtained by dividing T_{A}, which is an RTC value of cryptographic system A, by 2^{n }(step 330). Cryptographic system A generates a session key using the entire RTC data T_{A }as a nonce (step 340), and then generates a ciphertext (step 350).
Cryptographic system A transfers the calculated value T_{A }mod 2^{n}, i.e., a representative value of a group to which the RTC value of cryptographic system A belongs, together with the ciphertext to cryptographic system B (step 360). Since only the representative value instead of T_{A}, which is the RTC value of cryptographic system A, is transferred, an amount of data to be transferred can be reduced.
Cryptographic system B receives a ciphertext and a representative value of an RTC from cryptographic system A (step 410), and restores the RTC value of cryptographic system A using the representative value (step 420).
To this end, X minimizing |X−T_{B}| is first calculated. Here, T_{B }is an RTC value of cryptographic system B, and X is as shown in Equation 2 above.
Through the process, Equation 3 above is satisfied, and remainders obtained by dividing X and T_{A }by 2^{n }are the same as each other. Consequently, X is equal to T_{A}.
When the entire RTC data of cryptographic system A is restored through the above described process, cryptographic system B restores a nonce using the entire RTC data to generate a session key of a receiving side (step 430) and decrypts the ciphertext (step 440).
A case in which entire RTC data is transferred and a case in which partial RTC data is transferred according to an exemplary embodiment of the present invention will be compared with each other below.
First, a transmitting cryptographic system may transfer entire RTC data. Since an RTC value is converted into about 2^{38.2 }seconds (9999 years*365 days*24 hours*60 minutes*60 seconds), the value corresponding to about 39 bits must be transferred. In a poor communication environment, it is difficult to transfer 39-bit data.
On the other hand, when partial RTC data is transferred according to an exemplary embodiment of the present invention, a transmitting cryptographic system transfers only about the double of a largest RTC difference between cryptographic systems instead of its entire RTC value. Thus, it is possible to remarkably reduce the amount of data to be transferred in comparison with 39 bits required for transferring the entire RTC data. For example, when largest values of RTC difference between cryptographic systems are one minute, i.e., about 2^{5.9 }seconds, one hour, i.e., about 2^{11.8 }seconds, and one day, i.e., about 2^{16.4 }seconds, a transmitting cryptographic system transfers only 7 bits, 13 bits and 18 bits, respectively.
According to the present invention, entire RTC data of a cryptographic system is used as a nonce value required for generating a session key between the cryptographic system and another cryptographic system, and an amount of RTC data to be transferred is minimized, so that the cryptographic systems can operate in a poor communication environment.
While the invention has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
Cited Patent | Filing date | Publication date | Applicant | Title |
---|---|---|---|---|
US4924515 * | Aug 24, 1989 | May 8, 1990 | International Business Machines Coprporation | Secure management of keys using extended control vectors |
US5265164 * | Oct 31, 1991 | Nov 23, 1993 | International Business Machines Corporation | Cryptographic facility environment backup/restore and replication in a public key cryptosystem |
US5343527 * | Oct 27, 1993 | Aug 30, 1994 | International Business Machines Corporation | Hybrid encryption method and system for protecting reusable software components |
US5533123 * | Jun 28, 1994 | Jul 2, 1996 | National Semiconductor Corporation | Programmable distributed personal security |
US5745572 * | Jan 17, 1996 | Apr 28, 1998 | International Computers Limited | Cryptographic key management |
US7024561 | Dec 21, 2001 | Apr 4, 2006 | Victor Company Of Japan, Limited. | Contents recording apparatus, recording medium, contents reproducing apparatus, contents transmission method, transmission medium, and contents reception method |
US20020087860 | Oct 19, 2001 | Jul 4, 2002 | David William Kravitz | Cryptographic data security system and method |
US20070101152 | Oct 17, 2005 | May 3, 2007 | Saflink Corporation | Token authentication system |
EP0656708A1 | Dec 3, 1993 | Jun 7, 1995 | International Business Machines Corporation | System and method for the transmission and validation of an updated encryption key between two users |
JP2005274275A | Title not available | |||
JPS61296835A | Title not available | |||
KR20010002738A | Title not available | |||
KR20020025343A | Title not available | |||
KR20030076457A | Title not available | |||
KR20040085113A | Title not available |
U.S. Classification | 380/255, 380/264, 380/35 |
International Classification | H04K1/00 |
Cooperative Classification | H04L9/0891, H04L9/12 |
European Classification | H04L9/12 |
Date | Code | Event | Description |
---|---|---|---|
Apr 15, 2008 | AS | Assignment | Owner name: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTIT Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KIM, JAE HEON;HAN, JAE WOO;KIM, DONG CHAN;AND OTHERS;REEL/FRAME:020803/0626 Effective date: 20080331 |
Apr 1, 2015 | FPAY | Fee payment | Year of fee payment: 4 |